Submitted by: Submitted by techgirl72
Views: 818
Words: 3929
Pages: 16
Category: Science and Technology
Date Submitted: 06/13/2013 12:09 PM
Case Study 3: Mobile Devices Security
By:
CIS
Theories of Security Management
Quarter
University
Professor:
Date:
ABSTRACT
In this Case Study I will describe the emerging cyber-security issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report. I will analyze vulnerabilities of mobile devices in regard to usability and suggest methods to mitigate the vulnerabilities of mobile devices. I plan to assess and describe the value of cryptography and encryption in regard to Equifax’s approach to implementing stronger security policies around mobile devices.
I will justify Gunter Ollmann’s comments about Zeus-in-the-Mobile (ZitMo) and describe the implications of advanced security breaches such as this. I also will determine what you believe is the greatest challenge in regard to controlling information online. And lastly I will justify Dan Kuykendall’s statement about the biggest issue with mobile browsers and give two examples illustrating his point.
Emerging Cyber-Security Issues and Vulnerabilities Presented in the “Emerging Cyber Threats 2012” Report
Mobile applications rely increasingly on the browser, presenting unique challenges to security in terms of usability and scale (Ahamad et al., 2011). When it comes to securing mobile phones from emerging threats, scale, usability and device constraints present some interesting challenges (Ahamad et al., 2011). Tension between usability and security, along with device constraints make it difficult to solve mobile Web browser security flaws (Ahamad et al., 2011). Small screens can make vulnerabilities more serious and present attackers with an opportunity (Ahamad et al., 2011). The varied existence of SSL icons on mobile browsers can also contribute to successful exploitation. Understandably, display security on mobile browsers...